Repo for experimenting and testing MCP server builds for CTI-related research.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"mcp-cti": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
An MCP (Model Context Protocol) server for accessing AlienVault Open Threat Exchange (OTX) threat intelligence directly in Claude.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
An evil MCP server used for redteam testing
MCP server for Atomic Red Team
Signed receipts for agent, API, and MCP interactions. Portable and offline-verifiable.
MCP Security Weekly
Get CVE alerts and security updates for Mcp Cti and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
An MCP (Model Context Protocol) server for accessing AlienVault Open Threat Exchange (OTX) threat intelligence directly in Claude.
This server connects to AlienVault's OTX DirectConnect API, allowing the Claude for desktop client to search, retrieve, and analyse cyber threat intelligence data. Use this tool to interact with the OTX API using natural language prompting via Claude. By installing this MCP server, you get access to the most recent threat data, including:
| Tool Name | Description |
|---|---|
search_pulses | Search for threat intelligence pulses in OTX |
get_recent_pulses | Get recent threat intelligence pulses |
get_pulse_details | Get detailed information about a specific pulse |
get_pulse_indicators | Get indicators of compromise (IOCs) from a specific pulse |
get_indicator_details | Get detailed information about a specific indicator |
check_indicator_malicious | Check if an indicator is known to be malicious |
get_threat_actor | Get information about a specific threat actor |
uv package manager (recommended) or pipgit clone https://github.com/your-username/otx-mcp-server.git
cd otx-mcp-server
uv venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
uv pip install -e
git clone https://github.com/your-username/otx-mcp-server.git
cd otx-mcp-server
python -m venv .venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
pip install -e
Add the following to your Claude Desktop configuration (claude_desktop_config.json):
"mcpServers": {
"otx": {
"command": "uv",
"args": [
"--directory",
"/path/to/otx-mcp-server",
"run",
"otx"
],
"env": {
"OTX_API_KEY": "YOUR_API_KEY_HERE"
}
}
}
}
The configuration file is typically located at:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
Linux: ~/.config/Claude/claude_desktop_config.json
Here are some example prompts to use with the OTX MCP server: